Beyond the Ballot Box - Securing America’s Supporting Election Technology
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore the critical yet often overlooked aspects of election security in this 27-minute RSA Conference talk. Delve into the Center for Internet Security's recommendations for securing and verifying America's Internet-connected election technology. Learn about the most vulnerable components of election infrastructure and gain insights from a verification pilot project. Discover security best practices, risk-based approaches, and rapid testing methods for election officials. Understand the challenges posed by ransomware and rapid product changes in the election technology landscape. Examine the process of architecture reviews, security claims validation, and the importance of built-in incentives for secure systems. Gain valuable knowledge on how to protect the supporting election technology that plays a crucial role in maintaining the integrity of democratic processes.
Syllabus
Intro
What is supporting election technology
Security best practices
Election officials
Ransomware
Rapid Product Changes
RiskBased Approach
Process Assessment
Architecture Review
Security Claims Validation
Testing Rules Determination
Rapid Testing
Builtin Incentives
Valid Artifacts
Whats Next
Main Questions
Architecture Reviews
Questions
Taught by
RSA Conference
Related Courses
Master Mathematical Cryptography 2020: Crack Any CodeUdemy Cryptography from Scratch| Master Cryptography in Java
Udemy Information Security in Python
Udemy Cryptography
Caleb Curry via YouTube Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube